Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.

Password guessing with Medusa 2.0 - Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit


(Apr 18)

Multiple vulnerabilities have been discovered in the Xen hypervisor. The Common Vulnerabilities and Exposures project identifies the following problems: [More...]

(Apr 17)

David Airlie and Peter Hutterer of Red Hat discovered that xorg-server, the Xorg X server was vulnerable to an information disclosure flaw related to input handling and devices hotplug. [More...]


Mandriva: 2013:144: phpmyadmin (Apr 16)

Multiple cross-site scripting (XSS) vulnerabilities in tbl_gis_visualization.php in phpMyAdmin 3.5.x before 3.5.8 might allow remote attackers to inject arbitrary web script or HTML via the (1) visualizationSettings[width] or (2) visualizationSettings[height] parameter (CVE-2013-1937). [More...]

Mandriva: 2013:143: poppler (Apr 15)

Multiple vulnerabilities has been found and corrected in poppler: poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an invalid memory access in (1) splash/Splash.cc, [More...]

Mandriva: 2013:142: postgresql (Apr 11)

Multiple vulnerabilities has been discovered and corrected in postgresql: PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare [More...]

Mandriva: 2013:141: libxslt (Apr 11)

Updated libxslt packages fix security vulnerability: Nicholas Gregoire discovered that libxslt incorrectly handled certain empty values. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could [More...]


Red Hat: 2013:0758-01: java-1.6.0-sun: Critical Advisory (Apr 18)

Updated java-1.6.0-sun packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More...]

Red Hat: 2013:0757-01: java-1.7.0-oracle: Critical Advisory (Apr 18)

Updated java-1.7.0-oracle packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More...]

Red Hat: 2013:0753-01: icedtea-web: Moderate Advisory (Apr 17)

Updated icedtea-web packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2013:0751-01: java-1.7.0-openjdk: Critical Advisory (Apr 17)

Updated java-1.7.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical [More...]

Red Hat: 2013:0752-01: java-1.7.0-openjdk: Important Advisory (Apr 17)

Updated java-1.7.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having [More...]

Red Hat: 2013:0747-01: kernel: Moderate Advisory (Apr 16)

Updated kernel packages that fix several security issues and three bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2013:0748-01: krb5: Moderate Advisory (Apr 16)

Updated krb5 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2013:0741-01: kernel: Important Advisory (Apr 16)

Updated kernel packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 6.2 Extended Update Support. The Red Hat Security Response Team has rated this update as having [More...]

Red Hat: 2013:0742-01: 389-ds-base: Low Advisory (Apr 15)

Updated 389-ds-base packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low [More...]

Red Hat: 2013:0737-01: subversion: Moderate Advisory (Apr 11)

Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate [More...]


Ubuntu: 1805-1: Linux kernel vulnerabilities (Apr 19)

Several security issues were fixed in the kernel.

Ubuntu: 1804-1: IcedTea-Web vulnerabilities (Apr 18)

Two security issues were fixed in IcedTea-Web.

Ubuntu: 1803-1: X.Org X server vulnerability (Apr 17)

The X server could be made to reveal keystrokes of other users.

Ubuntu: 1802-1: Samba vulnerability (Apr 16)

Samba would allow unintended write access to files over the network.

Ubuntu: 1801-1: curl vulnerability (Apr 15)

Applications using libcurl could be made to expose sensitive informationover the network.

Ubuntu: 1800-1: HAProxy vulnerabilities (Apr 15)

HAProxy could be made to crash or run programs if it received speciallycrafted network traffic.